Monitor alerts and security events and protect against cyber-attacks.
Analyze security incidents, tracing attacks and triaging alerts.
Analyze logs from various sources to identify patterns or anomalies.
Implement dashboards to clarify the detection view.
Escalate incidents to higher-tier analysts when it is necessary.
Create incident or trouble tickets, and follow-up tickets.
Create security reports and document results.
Rotating shifts 24/7.
Requirements
University Degree:
Successfully completed university degree in Computer Science, IT Security, or comparable qualification.
Experience:
+1 years of relevant professional experience in SOC Tier-1.
Knowledge:
Knowledge of cyber threats and vulnerabilities.
Knowledge of networks and network security and understanding of network monitoring and protocols.
Understanding concepts of firewall, UTM, VPN, WAF, IPS/IDS, and EDR.
Knowledge of CEH, PWK, LPIC, and Microsoft Windows (preferred).
Skills:
Experience or certifications in SIEM (e.g., Splunk, ELK), Vulnerability Management (e.g., Tenable), and Endpoint Protection Systems (e.g., Anti-Malware, EDR).
Experience in fundamental attack concepts (terminology, tools, processes, etc.).
High level of resilience and stress stability, good communication and teamwork skills, Sense of responsibility and commitment.
Hands-on experience in Linux audit, Windows event logs, Sysmon, and firewall logs.